12,921 research outputs found

    Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

    Get PDF
    Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use casesinfo:eu-repo/semantics/publishedVersio

    Regulating Data as Property: A New Construct for Moving Forward

    Get PDF
    The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership of digital information be achieved? How can those rights be transferred and enforced? Those calls for data ownership emphasize the impact of ownership on the automotive industry and the vast quantities of operational data which smart automobiles and self-driving vehicles will produce. We looked at how, if at all, the issue was being considered in consumer-facing statements addressing the data being collected by their vehicles. To formulate our proposal, we also considered continued advances in scientific research, quantum mechanics, and quantum computing which confirm that information in any digital or electronic medium is, and always has been, physical, tangible matter. Yet, to date, data regulation has sought to adapt legal constructs for “intangible” intellectual property or to express a series of permissions and constraints tied to specific classifications of data (such as personally identifiable information). We examined legal reforms that were recently approved by the United Nations Commission on International Trade Law to enable transactions involving electronic transferable records, as well as prior reforms adopted in the United States Uniform Commercial Code and Federal law to enable similar transactions involving digital records that were, historically, physical assets (such as promissory notes or chattel paper). Finally, we surveyed prior academic scholarship in the U.S. and Europe to determine if the physical attributes of digital data had been previously considered in the vigorous debates on how to regulate personal information or the extent, if at all, that the solutions developed for transferable records had been considered for larger classes of digital assets. Based on the preceding, we propose that regulation of digital information assets, and clear concepts of ownership, can be built on existing legal constructs that have enabled electronic commercial practices. We propose a property rules construct that clearly defines a right to own digital information arises upon creation (whether by keystroke or machine), and suggest when and how that right attaches to specific data though the exercise of technological controls. This construct will enable faster, better adaptations of new rules for the ever-evolving portfolio of data assets being created around the world. This approach will also create more predictable, scalable, and extensible mechanisms for regulating data and is consistent with, and may improve the exercise and enforcement of, rights regarding personal information. We conclude by highlighting existing technologies and their potential to support this construct and begin an inventory of the steps necessary to further proceed with this process

    The impact of inter-organizational management control systems on performance: a longitudinal case study of a supplier relation in automotive.

    Get PDF
    This study investigates whether appropriate management control design of supplier relations is associated with better performance. Although management control systems (MCSs) are found to be contingent on situational characteristics, it remains unclear whether this contingency fit contributes to performance. In order to illustrate the existence and refine the dynamics of the fit-performance association, we perform a longitudinal case study of an exemplary automotive manufacturer-supplier relation that was subject to considerable change and severe performance difficulties in the course of time. As proposed, case findings show that if the supplier is incapable of dealing with changed contingencies, a MCS contingency misfit is associated with poor operational performance. However, this misfit is only temporal, as the manufacturer adapts the MCS to fit the changed supplier relation and regain operational performance. In addition, the longitudinal study suggests that trust and basic formal control (control continuously exercised under all circumstances) are complements, while trust substitutes for extra formal control (control set up on top of basic formal control). Finally, the data indicate a timing difference in the substitutive relation: the building up of extra formal control proceeds gradually, while the lowering happens almost immediately.management control; trust; performance; supplier relationships; manufacturing; contingency theory; case research; automotive;

    Process Based Management and the Central Role of Dialogical Collective Activity in Organizational Learning. The Case of Work Safety in the Building Industry

    Get PDF
    The notion of “process”, which describes the cooperation of heterogeneous practices and competences for a given output, has gained a major position in managerial practices for the last twenty years. This paper presents three ideas about organizational dynamics and processes and tests their applicability in the case of work safety improvement in a building company. The first idea is that the success of the process notion shows the central role of “conjoint” (as opposed to “common”) collective activity in organizational learning. Conjoint collective activity is dialogical (“acts speak”) and mediated by the utilization of semiotic systems (languages and technical and managerial tools). The second idea is that organizational learning is neither based on the actors’ individual subjectivity nor on the technological and objective artefacts engaged in the processes, but rather on the reflexive understanding and ongoing redesign of processes by the process actors themselves, in the frame of a reflexive inquiry, a “collective activity about collective activity” which is triggered and kept in motion by axiological judgments (process evaluation). The third idea is that the possibilities to configure processes in a given organization are multiple. The reflexive inquiry enacts a specific social, spatial and time configuration of the process, its “chronotope” in Bakhtin’s vocabulary, which plays a major role in the way actors can make sense of their collective activity and transform it. A longitudinal case study about work safety on the building yards shows that it is difficult to “control out” risk at work once designs have been established, in the frame of the “project execution” process, but it is easier to “design out” risk, when the actors of the process collectively design and redesign their collective activity, from the very first phases of a building project to the end. Therefore a major way to improve safety consists in extending the chronotope of the collective activity under consideration, overcoming the traditional separation between “design / planning” and “execution”. The conclusion summarizes the main theoretical, epistemological and practical issues involved in this research about conjoint collective activity.Business Process; Chronotope; Collective Activity; Collective Sense Making; Dialogism; Inquiry; Process-based Management; Safety Management

    Lifecycle Management of Automotive Safety-Critical Over the Air Updates: A Systems Approach

    Get PDF
    With the increasing importance of Over The Air (OTA) updates in the automotive field, maintaining safety standards becomes more challenging as frequent incremental changes of embedded software are regularly integrated into a wide range of vehicle variants. This necessitates new processes and methodologies with a holistic view on the backend, where the updates are developed and released

    Ethernet - a survey on its fields of application

    Get PDF
    During the last decades, Ethernet progressively became the most widely used local area networking (LAN) technology. Apart from LAN installations, Ethernet became also attractive for many other fields of application, ranging from industry to avionics, telecommunication, and multimedia. The expanded application of this technology is mainly due to its significant assets like reduced cost, backward-compatibility, flexibility, and expandability. However, this new trend raises some problems concerning the services of the protocol and the requirements for each application. Therefore, specific adaptations prove essential to integrate this communication technology in each field of application. Our primary objective is to show how Ethernet has been enhanced to comply with the specific requirements of several application fields, particularly in transport, embedded and multimedia contexts. The paper first describes the common Ethernet LAN technology and highlights its main features. It reviews the most important specific Ethernet versions with respect to each application field’s requirements. Finally, we compare these different fields of application and we particularly focus on the fundamental concepts and the quality of service capabilities of each proposal

    Coupling production networks and regional assets in manufacturing clusters

    Get PDF
    Paradoxically, the ongoing process of globalisation goes hand in hand with a surge of interest in the ‘local’ sources of firm competitiveness. In this paper, we develop a frame of analysis that helps to understand ‘coupling’ of production networks and regional development. Our aim is to reflect on the ‘spatiality’ of different types of networks, and to study the dynamic coupling process between these networks and regional assets. We apply the framework to two case studies – shipbuilding in Turku and machine building in Porto. Our analysis points towards the relevance of regional assets facilitating this coupling process and in strengthening regions as magnets for global production networks, reinforcing the long term sustainability of different types of clusters

    Analysis as first-class citizens – an application to Architecture Description Languages

    Get PDF
    Architecture Description Languages (ADLs) support modeling and analysis of systems through models transformation and exploration. Various contributions made proposals to bring verification capabilities to designers through model-based frame- works and illustrated benefits to the overall system quality. Model-level analyses are usually performed as an exogenous, unidirectional and semantically weak transformation towards a third-party model. We claim such process can be incomplete and/or inefficient because gathered results lead to evolution of the primary model. This is particularly problematic for the design of Distributed Real-Time Embedded (DRE) systems that has to tackle many concerns like time, security or safety. In this paper, we argue why analysis should no longer be considered as a side step in the design process but, rather, should be embedded as a first-class citizen in the model itself. We review several standardized architecture description languages, which consider analysis as a goal. As an element of solution, we introduce current work on the definition of a language dedicated to the analysis of models within the scope of one particular ADL, namely the Architecture Analysis and Design Language (AADL)

    Joint use of static and dynamic software verification techniques: a cross-domain view in safety critical system industries

    Get PDF
    International audienceHow different are the approaches to combining formal methods (FM) and testing in the safety standards of the automotive, aeronautic, nuclear, process, railway and space industries? This is the question addressed in this paper by a cross-domain group of experts involved in the revision committees of ISO 26262, DO-178C, IEC 60880, IEC 61508, EN 50128 and ECSS-Q-ST-8OC. First we review some commonalities and differences regarding application of formal methods in theaforementioned standards. Are they mandatory or recommended only? What kind of properties are they advised to be applied to? What is specified in the different standards regarding coverage (both functional and structural) if testing and formal methods are used jointly?We also account for the return on experience of the group members in the six industrial domains regarding state of the art practice of joint use of formal methods and testing. Where did formal methods actually prove to outperform testing? Then we discuss verification coverage, and more specifically the role of structural coverage. Does structural coverage play the same role in all the standards? Is it specific to testing and irrelevant for formal methods? What verification terminationcriteria is applicable in case FM-test mix? We conclude on some prospective views on how software safety standards may evolve to maximize the benefits of joint use of dynamic (testing) and static (FM) verification methods
    • 

    corecore